Petya Ransomware: How It Works And How To Beat It
Businesses and institutions were victimized by a new and more menacing global malware attack. The perpetrators used the Petya ransomware worm to carry out the cyber attack starting on Tuesday morning.
It is now believed that the Petya ransomware was just some kind of cover for the real culprit. Underneath the Petya is a kind of malware now being dubbed by some as "NotPetya" and "Goldeneye." Petya is originally an older version of the said malware and the new one that's wreaking havoc around the globe is said to be a new strain of the malware.
The Petya cyber attack crippled companies by locking down or freezing their computers. This was done by targeting vulnerable Windows Server Message Block, a service utilized for file and printer sharing across local networks. Petya was also spread through Microsoft PsExec.
The Petya ransomware rapidly spread from Ukraine to other companies in Europe via enterprise networks. The speculation is that the ransomware spread via foreign companies with subsidiaries or operations in Ukraine. The Petya apparently traveled "upstream" via corporate VPNs to central servers and then to computers with Windows. According to Tom's Guide, there is also proof that Petya spread through infected email attachments but this has yet to be looked upon more closely.
To stop Petya from spreading, people should download the patch created to deal with this latest cyber attack. Users should also have the latest version of Microsoft Windows. Those with Windows that updates automatically are safe from the attack. CNET has a list of the links where users can download security updates necessary to stop Petya from affecting their computers and spreading further. It is also important to have an updated antivirus software and to avoid opening attachments from unknown sources. It is also vital that users keep a backup of their files especially the important ones. In the event that Petya infects their computers, they will still have access to their files.
Hackers Are Using Movie Subtitles To Access Your Computers
Hackers have found a way to insert malicious files into movie subtitles that will let them take control of computers and smart TVs.
Meet The 22-Year-Old Who Stopped The Massive WannaCry Cyberattack
Marcus Hutchins is a 22-year-old undergrad surfer and cybersecurity expert who successfully foiled a WannaCry Ransomware attack.
IBM Put Customers At Risk With Malware-Infested Flash Drives, Here’s What To Do
IBM has admitted to inadvertently shipping out USB flash drives infected with Trojan malware.
Cyber Attacks Take Down Twitter, Reddit, Spotify And Other Websites
A series of DDos attacks on Friday targeting Dyn DNS rendered numerous websites useless.
Massive Cyberattack Is Spreading Havoc Around The World, Deadlier Than WannaCry
A new cyber attack, likely deadlier than WannaCry, is locking computers worldwide with huge businesses and major institutions among those targeted.
MORE IN ITECHPOST
Top 5 Ways to Make Your Skin Glow
Transforming your skin should not be a huge challenge. We've prepared some expert tips from dermatologists and other skin professionals. These tips will help you restore the radiant and healthy, natural glow on your skin. First appearances count, so take the time to study these tips and use the products mentioned. You'll find that maintaining that youthful glow is not a big deal.
Johns Hopkins Researchers Discover Material That Could Someday Power Quantum Computer
Quantum computers with the ability to perform complex calculations, encrypt data more securely and more quickly predict the spread of viruses, may be within closer reach thanks to a new discovery by Johns Hopkins researchers.
Black Holes Stunt Growth of Dwarf Galaxies
UC Riverside astronomers find large-scale winds associated with active black holes in small galaxies suppress star formation
'Resident Evil 6' and 'Resident Evil 5' Demos are Now Available on Nintendo Switch
Fans of "Resident Evil" can finally play the demos for the fifith and sixth installment on Switch.